Cyber Risk Management

Cybersecurity for Enterprise Teleworking during the WFH Contingency

The coronavirus pandemic swept entire workforces into makeshift home offices. Some people got a desk and a door. Others got a laptop on the upside-down hamper in the hall. On social media, work from home (WFH) employees celebrated the silver linings: happy pets, lunch!, discovering that a robe pocket fits a pen and notebook. But… Read more »

Really…what is CHECKLIGHT™?

  Sera-Brynn CEO and Towne Insurance EVP explain the concept behind the insurance industry technology product. We get asked this question all the time and thought addressing those inquiries via a “quick read” blogpost would be helpful. (Emphasis on “quick” … so it should only take three minutes or so to read.) Sera-Brynn is a… Read more »

Own It, Secure IT and Protect IT: National Cybersecurity Awareness Month Kicks Off with a Theme of Personal Accountability

National Cybersecurity Awareness Month 2019 focuses on being accountable and proactive — hence the “Own IT. Secure IT. Protect IT.” slogan. Here are some tips and references on how you can incorporate this into your daily activities at work, home, and on the go: Social Media Multi-factor authentication, or MFA, is widely available now and… Read more »

Cybersecurity’s 3-Million-Person Workforce Shortage is Now a Risk Management Problem

Cybersecurity’s 3-million-person workforce shortage is now a risk management problem. The cybersecurity workforce needs and wants you!  Good news for many of us – but from an employer or strategic workforce planning perspective, this is problematic. There’s now a shortage of people qualified to protect data, systems, and operations. Worldwide, the cybersecurity workforce shortage is… Read more »

GSA’s proposed new rule to govern data breaches, government access, proprietary information, and contractor responsibilities

In November 2018, U.S. General Services Administration (GSA) published its intent to enact a new rule on the reporting of data breaches. GSA is the U.S. government’s lead contracting agency. GSA also manages many government-wide IT security programs, like FedRAMP and cloud.gov. The proposed rule will ensure that GSA, plus the agency customer, will have… Read more »

Privacy Framework: NIST is in the House.

This month, NIST kicked off a series of public meetings to highlight its efforts to create a voluntary Privacy Framework. Much in the same way it developed the Cybersecurity Framework, NIST is trying to achieve a technology-privacy balance within the guidance by crowdsourcing its way there.  By bringing in views from federal agencies, small businesses,… Read more »

FedRAMP: A Heavyweight Security Framework for Cloud Service Providers

You need FedRAMP if you want to prove your cloud services is secure enough for U.S. government data. Read the full September 6, 2018 article published on cybersecurityventures.com here. In its latest Compliance Report for Cybersecurity Ventures, Sera-Brynn shared how FedRAMP came into being, who should care, and why being FedRAMP-authorized is important for companies. “The… Read more »

We applaud the G-7 `fundamental elements’ that highlight an international commitment to fighting cyber bad actors

The Group of 7 (G-7) has published the “fundamental elements” of best practices in cybersecurity for public and private entities in the financial sector that highlights the international effort to protect global finance in the wake of a series of cyber bank heists and finance sector attacks. The G-7 is comprised of the U.S., Great… Read more »

Sera-Brynn CEO Rob Hegedus featured cybersecurity speaker at the National Risk Retention Association Conference

Sera-Brynn Chief Executive Officer Rob Hegedus will be a featured speaker on cybersecurity at the National Risk Retention Association 2016 National Conference in Chicago Sept. 28. The three-day conference from Sept. 27-29 will focus on the future of the insurance industry and self-insurance in particular as it adapts to the ever-changing technological challenges facing specific… Read more »